File: /home/admin/Maildir/cur/1741954801.M602051P1884662.kakhelebi.rst.ge:2,
Return-path: <pm_bounces@pm-bounces.mailgenius.com>
Envelope-to: admin@rst.ge
Delivery-date: Fri, 14 Mar 2025 08:20:01 -0400
Received: from mta16-ab1.mtasv.net ([50.31.205.16])
by kakhelebi.rst.ge with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384
(Exim 4.98)
(envelope-from <pm_bounces@pm-bounces.mailgenius.com>)
id 1tt411-00000007uHN-45ze
for admin@rst.ge;
Fri, 14 Mar 2025 08:20:01 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; s=ab20241004; d=ab.mtasv.net;
h=From:Date:Subject:Message-Id:Reply-To:To:List-Unsubscribe:
List-Unsubscribe-Post:MIME-Version:Content-Type:Content-Transfer-Encoding:
Date:From:Message-ID:Reply-To:Sender:Subject:To:CC; t=1741954791; x=1742041191;
bh=gIX3pANcR/Qgnv+OOInpSkf5ACiUISqYi0xZxFmm16E=;
b=e1DT5Lmy/d1hSoSF5SDCRlNdkkGn6Io4qu3dpaHDk64kuuu9yFODaMbYa8Hgc09Y2D2Ru/sw52zw
JqiZlEFBzAjwfv2mJZBCKdjftUEKUpudhhuNWd15boqF4mwjcL5NizYFYsBhi7f1slnLcaq4uiT1
GaTpTMb83mrO+JcJxXDMAOzR7WdzdKiI4AlJC4+RZmNUv+ltEsuz2MmjiaOHVNq7kZvYWTBsQ6MA
vGMBtiZLk+/uz+p1chKjXqAe6JfrO+I5QPZ0pBjtVaaJO+lKZsNnEe1kjztgnzkODxbSTNuQXEk4
MUuxm1HwosVLKxoWhkz0mCknxVtZhMfHzQAGxA==
Received: by mta16-ab1.mtasv.net id hqgfee3864o5 for <admin@rst.ge>; Fri, 14 Mar 2025 08:19:50 -0400 (envelope-from <pm_bounces@pm-bounces.mailgenius.com>)
X-PM-IP: 50.31.205.16
X-IADB-IP: 50.31.205.16
X-IADB-IP-REVERSE: 16.205.31.50
DKIM-Signature: v=1; a=rsa-sha256; d=mailgenius.com; s=20200624223046pm;
c=relaxed/relaxed; i=troy@mailgenius.com; t=1741954790; x=1742127590;
h=date:date:from:from:message-id:reply-to:reply-to:sender:subject:subject:to:
to:cc:list-unsubscribe:list-unsubscribe-post:feedback-id:mime-version:
content-type:content-transfer-encoding;
bh=gIX3pANcR/Qgnv+OOInpSkf5ACiUISqYi0xZxFmm16E=;
b=QCE8HR3WednM2K54wJ2SSY/SsXl44GMQNIcZDBv15FwVseodY3U8vEDFyPKTkp4WuocjU9sfjKt
atEzQVl8Ax/Mar1rDP55TlC/X7g4bF+9SdVq6eiUxcCSCB9TJJ0btxjFD/pI1G/6bQ5yC1EQEbMx4
7XAR7VB7AHaRfdBBZLQ=
From: Troy at MailGenius <troy@mailgenius.com>
Date: Fri, 14 Mar 2025 12:19:50 +0000
Subject: Need Clients? Check this out.
Message-Id: <c96db320-aaec-4826-b730-8356d9114511@mtasv.net>
Reply-To: Troy at MailGenius <troy@mailgenius.com>
To: admin@rst.ge
List-Unsubscribe:
<https://subscriptions.pstmrk.it/unsubscribe?m=1.39hUvQn_MJ9FrZkmIonBaQ.MDNxSHusEhqIFzAM1dFsQJmzhl_RAE1ns5HIYYlxjMGhwmT3nm4l6ok6TYJVNdtVaqdAUFSblHNVD8HEngjvbcWA5f-4TudVXbgnI8AqKanL4M67hqgF3c2mbm4ftrnNVp948rCMt7-W3v8Mmo3S8QBcE9NX4CjISv8w4IkRN1EjCZZhW5PiZ1BLJ1nWz42QZKOoogdBOWFx1YaI_jEEEJ9ILy3DaMbsPh1JQkL1G3dqfAAj40Q9U2ZUXDLOOYjRM-qFqUiENq4eCMt4IXR3X_jK_yI5BP2qc0QK-rRlbbhc7gDuCfSyuwuOgwURJvXiITJ2J26mQF91jbVjRsF84nb6c76Xk2r6-txZpKBYujToF2vwEfxY-p9zi0gq_IiJO61qodfL5PvUaupwMxRBgrOP-uMRZpM0Y02G8cSwiPNqTQe-ngQvLJM4RmXpQWTPODQtJV9_leJBvnokOjwSL_P2-6q2zIZIestfRQ1TDqo>
List-Unsubscribe-Post: List-Unsubscribe=One-Click
Feedback-ID: s4780126-_:s4780126:a170477:postmark
X-Complaints-To: abuse@postmarkapp.com
X-PM-Message-Id: c96db320-aaec-4826-b730-8356d9114511
X-PM-RCPT: |bTB8MTcwNDc3fDQ3ODAxMjZ8YWRtaW5AcnN0Lmdl|
X-PM-Message-Options: v1;1.zMjgnFDFbvzkSv03rIBvuQ.4vSY2SffT7PQkEyYp4FWSQJQrM-uj-qFTbm2NxUupOnxvtPmdAmj1FTm2_RF9xjkrqz0MfnuvJ3L1LcLM_Z17Fsk3CQ98_7pwAKwr6-AP0tv7cHMZUOcAIAizBc4opjH5gQkOxqkSxgNZsyX3VPiF8HYMPQpj5mmSVW7P4DAfTJ70MArorzffrq7KT6aXYUS
MIME-Version: 1.0
X-PM-MTA-Pool: application-bulk-1
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Forward-Confirmed-ReverseDNS: Reverse and forward lookup success on 50.31.205.16, -10 Spam score
SPFCheck: Server passes SPF test, -30 Spam score
X-DKIM: signer='ab.mtasv.net' status='pass' reason=''
DKIMCheck: Server passes DKIM test, -20 Spam score
X-DKIM: signer='mailgenius.com' status='pass' reason=''
X-DKIM: signer='troy@mailgenius.com' status='pass' reason=''
X-Spam-Score: -1.8 (-)
X-Spam-Report: Spam detection software, running on the system "kakhelebi.rst.ge",
has NOT identified this incoming email as spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview:
[...]
Content analysis details: (-1.8 points, 2.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked.
See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URI: rawpixel.com]
[URI: mailgenius.com]
[URI: send-link.email]
0.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The
query to Validity was blocked. See
https://knowledge.validity.com/hc/en-us/articles/20961730681243
for more information.
[50.31.205.16 listed in sa-trusted.bondedsender.org]
0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
Validity was blocked. See
https://knowledge.validity.com/hc/en-us/articles/20961730681243
for more information.
[50.31.205.16 listed in bl.score.senderscore.com]
0.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
Validity was blocked. See
https://knowledge.validity.com/hc/en-us/articles/20961730681243
for more information.
[50.31.205.16 listed in sa-accredit.habeas.com]
0.0 RCVD_IN_MSPIKE_H4 RBL: Very Good reputation (+4)
[50.31.205.16 listed in wl.mailspike.net]
-0.0 SPF_HELO_PASS SPF: HELO matches SPF record
-0.0 SPF_PASS SPF: sender matches SPF record
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's
domain
0.0 RCVD_IN_MSPIKE_WL Mailspike good senders
-1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
[score: 0.0000]
0.1 ACT_NOW_CAPS BODY: Talks about 'acting now' with capitals
0.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
0.0 HTML_MESSAGE BODY: HTML included in message
SpamTally: Final spam score: -117
<!DOCTYPE html><html lang=3D"und" dir=3D"auto" xmlns=3D"http://www.w3.org/1=
999/xhtml" xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas=
-microsoft-com:office:office"><head>
<title></title>
<!--[if !mso]><!-->
<meta http-equiv=3D"X-UA-Compatible" content=3D"IE=3Dedge">
<!--<![endif]-->
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF-8=
">
<meta name=3D"viewport" content=3D"width=3Ddevice-width, initial-scale=3D=
1">
<style type=3D"text/css">
#outlook a { padding:0; }
body { margin:0;padding:0;-webkit-text-size-adjust:100%;-ms-text-size=
-adjust:100%; }
table, td { border-collapse:collapse;mso-table-lspace:0pt;mso-table-r=
space:0pt; }
img { border:0;height:auto;line-height:100%; outline:none;text-decora=
tion:none;-ms-interpolation-mode:bicubic; }
p { display:block;margin:13px 0; }
</style>
<!--[if mso]>
<noscript>
<xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
<o:PixelsPerInch>96</o:PixelsPerInch>
</o:OfficeDocumentSettings>
</xml>
</noscript>
<![endif]-->
<!--[if lte mso 11]>
<style type=3D"text/css">
.mj-outlook-group-fix { width:100% !important; }
</style>
<![endif]-->
=20
<!--[if !mso]><!-->
<link href=3D"https://send-link.email/v1/smtp_email/event/clicked/m=
essage/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJtZXNzYWdlSWQiOiI1SXRDSFNFZ00=
xYU81bG5iSWVFOSIsInVybCI6Imh0dHBzJTNBJTJGJTJGZm9udHMuZ29vZ2xlYXBpcy5jb20lMk=
Zjc3MlM0ZmYW1pbHklM0RVYnVudHUlM0EzMDAlMkM0MDAlMkM1MDAlMkM3MDAiLCJob3N0Ijoia=
HR0cHM6Ly9zZW5kLWxpbmsuZW1haWwiLCJpYXQiOjE3NDE5NTQ3OTAzNTl9.XYPyVpz6Wl84rUY=
D86uqvmhUn0LuDZaITSwCR4lNRrs" rel=3D"stylesheet" type=3D"text/css">
<style type=3D"text/css">
@import url(https://fonts.googleapis.com/css?family=3DUbuntu:300,=
400,500,700);
</style>
<!--<![endif]-->
=20
=20
<style type=3D"text/css">
@media only screen and (min-width:480px) {
.mj-column-per-100 { width:100% !important; max-width: 100%; }
}
</style>
<style media=3D"screen and (min-width:480px)">
.moz-text-html .mj-column-per-100 { width:100% !important; max-width:=
100%; }
</style>
=20
=20
=20
=20
=20
<style type=3D"text/css">
/* custom styles */ @media (min-width:481px) {
.mj-desktop-hidden-element {
display: none !important;
}
}
li p {
margin:0 !important;
}
p a, h1 a, h2 a, h3 a, h4 a, h5 a, li a {
color: inherit!important;
text-decoration-color: inherit!important;
text-decoration: underline;
font-weight: inherit;
font-style:inherit;
}
a span {
text-decoration: underline!important;
color: inherit;
}
span.ellipsis-text {
display: -webkit-box;
height:5lh;
-webkit-line-clamp: 5;
-webkit-box-orient: vertical;
overflow: hidden;
}
h3.ellipsis-title-text {
display: -webkit-box;
-webkit-line-clamp: 1;
height: 1lh;
-webkit-box-orient: vertical;
overflow: hidden;
}
.mj-accordion-title td > * {
margin: 0;
}
p {
min-height:1lh;
}
@media (max-width:480px) {
.mj-small-device-hidden-element {display:none !important;}
}
</style>
=20
</head>
<body style=3D"word-spacing:normal;">
=20
=20
<div class=3D"email-content" style=3D"background-color:#EAF0F6;backgr=
ound-image:url('');background-repeat:no-repeat;background-size:cover;backgr=
ound-position:center center;">
=20
<div style=3D"overflow:hidden;">
<table align=3D"center" border=3D"0" cellpadding=3D"0" cellspacing=3D=
"0" role=3D"presentation" style=3D"background:#ffffff;background-color:#fff=
fff;border-width:0px;padding:20px 0;padding-bottom:10px;padding-left:20px;p=
adding-right:20px;padding-top:10px;margin:0px auto 0px auto;width:100%;bord=
er-color:transparent;border-radius:0px;border-collapse:inherit;">
<tbody>
<tr>
<td>
=20
=20
<!--[if mso | IE]><table align=3D"center" border=3D"0" cellpadding=3D=
"0" cellspacing=3D"0" class=3D"" role=3D"presentation" style=3D"width:600px=
;" width=3D"600" bgcolor=3D"#ffffff" ><tr><td style=3D"line-height:0px;font=
-size:0px;mso-line-height-rule:exactly;"><![endif]-->
=20
=20
<div>
<div style=3D"margin:0px auto;border-color:transparent;border-radius:=
0px;max-width:600px;">
=20
<table align=3D"center" border=3D"0" cellpadding=3D"0" cellspacing=3D=
"0" role=3D"presentation" style=3D"width:100%;border-radius:0px;">
<tbody>
<tr>
<td style=3D"padding:0;border-color:transparent;direction:ltr=
;font-size:0px;text-align:center;">
<!--[if mso | IE]><table role=3D"presentation" border=3D"0"=
cellpadding=3D"0" cellspacing=3D"0"><tr><td class=3D"" style=3D"vertical-a=
lign:top;width:560px;" ><![endif]-->
=20
<div class=3D"mj-column-per-100 mj-outlook-group-fix" style=3D"font-s=
ize:0px;text-align:left;direction:ltr;display:inline-block;vertical-align:t=
op;width:100%;">
=20
<table border=3D"0" cellpadding=3D"0" cellspacing=3D"0" role=3D"present=
ation" style=3D"vertical-align:top;" width=3D"100%">
<tbody>
<tr>
<td align=3D"left" style=3D"font-size:0px;padding:10px =
25px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;=
word-break:break-word;">
=20
<div style=3D"font-family:Ubuntu, Helvetica, Arial, sans-serif;font-s=
ize:13px;line-height:1;text-align:left;color:#000000;"><div style=3D"displa=
y:none; visibility:hidden; opacity:0; height:0; width:0; overflow:hidden;">
<p style=3D"margin:0px"><span style=3D"font-family: arial">=E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C =E2=80=8C&nb=
sp;=E2=80=8C =E2=80=8C =E2=80=8C</span></p>
</div>
<div style=3D"text-align:center; color: #ccc; font-family: arial; font-size=
: 12px; padding: 10px;">
</div></div>
=20
</td>
</tr><tr>
<td align=3D"left" style=3D"font-size:0px;padding:10px =
25px;padding-top:0px;padding-right:10px;padding-bottom:10px;padding-left:10=
px;word-break:break-word;">
=20
<div style=3D"font-family:arial, helvetica, sans-serif;font-size:14px=
;line-height:1.25;text-align:left;color:#000000;"><p><span style=3D"font-si=
ze: 18px">Hey Grigoli,</span><br><br><br><span style=3D"font-size: 18px">La=
tely I've been sharing a few resources for freelancers as well as founders =
of client-based businesses.</span><br><br><br><span style=3D"font-size: 18p=
x">And last week I came a cross a really good one that I emailed you about =
(and today is the last opportunity to register, btw).</span><br><br><br><sp=
an style=3D"font-size: 18px">I told you that Christian Mickelsen is giving =
away free copies of his book about how to find, close, & charge clients bet=
ween $5-25k...</span><br><br><br><span style=3D"font-size: 18px">Which you =
can still get by clicking the link below.</span><br><br><br><span style=3D"=
font-size: 18px">But it gets even better because everyone who registers at =
the link below will ALSO get invited to a live call where Christian tries t=
o close a 100k client LIVE on the call!</span><br><br><br><span style=3D"fo=
nt-size: 18px">... Which is super bold & unique, so I wanted to share it wi=
th you.</span><br><br><br><span style=3D"font-size: 18px">Anyway, just clic=
k below to get his book for free & he'll also invite you to the live call w=
here he tries to close a 100k client:</span><br><br><br><a target=3D"_blank=
" href=3D"https://click.pstmrk.it/3s/send-link.email%2Fv1%2Fsmtp_email%2Fev=
ent%2Fclicked%2Fmessage%2FeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJtZXNzYWdl=
SWQiOiI1SXRDSFNFZ00xYU81bG5iSWVFOSIsInVybCI6Imh0dHBzJTNBJTJGJTJGbGluay5tc2d=
zbmRyLmNvbSUyRmVtYWlsLXRyYWNraW5nJTJGMzg4MmQ5MjgyMzQlM0Zjb250YWN0SWQlM0RYZ0=
JCdmhiWDVOQUJFaUFFeHZ5ViIsImhvc3QiOiJodHRwczovL3NlbmQtbGluay5lbWFpbCIsImlhd=
CI6MTc0MTk1NDc5MDM1OX0.Oq3WeXF8PNYIoelw5foQ_C0EFRNG6Ydt_hSCmqBgMWY/XvBI/pP2=
7AQ/AQ/c96db320-aaec-4826-b730-8356d9114511/1/8BRSQpMiOp"><span style=3D"co=
lor: rgb(77, 176, 253); font-size: 18px; color: rgb(77, 176, 253)">Click he=
re to get Christian's Free Book "Get Clients Today" + Get Invited to his Li=
ve 100k Call</span></a><br><br><br><span style=3D"font-size: 18px">Enjoy,<b=
r>Troy Ericson<br>CEO MailGenius.com</span></p></div>
=20
</td>
</tr><tr>
<td align=3D"center" style=3D"font-size:0px;padding:10p=
x 25px;padding-top:300px;padding-right:0px;padding-bottom:0px;padding-left:=
0px;word-break:break-word;">
=20
<p style=3D"border-top:solid 0px #FFFFFF;font-size:1px;margin:0px aut=
o;width:100%;">
</p>
=20
<!--[if mso | IE]><table align=3D"center" border=3D"0" cellpadding=3D=
"0" cellspacing=3D"0" style=3D"border-top:solid 0px #FFFFFF;font-size:1px;m=
argin:0px auto;width:560px;" role=3D"presentation" width=3D"560px" ><tr><td=
style=3D"height:0;line-height:0;">
</td></tr></table><![endif]-->
=20
=20
</td>
</tr><tr>
<td align=3D"left" style=3D"font-size:0px;padding:10px =
25px;padding-top:10px;padding-right:20px;padding-bottom:0px;padding-left:20=
px;word-break:break-word;">
=20
<div style=3D"font-family:Ubuntu, Helvetica, Arial, sans-serif;font-s=
ize:14px;line-height:1;text-align:left;color:#000000;"><p style=3D"text-ali=
gn: center; line-height: 1.25"><span style=3D"color: rgb(0, 0, 0); font-siz=
e: 12px; color: rgb(0, 0, 0)">To: admin@rst.ge <br>From: MailGenius LLC, 79=
01 4th St N, STE 300, St Petersburg, FL 33702, United States<br></span><a t=
arget=3D"_blank" title=3D"Manage All Subscriptions" href=3D"https://click.p=
stmrk.it/3s/send-link.email%2Fv1%2Fsmtp_email%2Fevent%2Fclicked%2Fmessage%2=
FeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJtZXNzYWdlSWQiOiI1SXRDSFNFZ00xYU81b=
G5iSWVFOSIsInVybCI6Imh0dHBzJTNBJTJGJTJGbGluay5tc2dzbmRyLmNvbSUyRmVtYWlsLXRy=
YWNraW5nJTJGNGQ1OGJiOTNmY2IlM0Zjb250YWN0SWQlM0RYZ0JCdmhiWDVOQUJFaUFFeHZ5ViU=
yNmVtYWlsJTNEYWRtaW4lNDByc3QuZ2UiLCJob3N0IjoiaHR0cHM6Ly9zZW5kLWxpbmsuZW1haW=
wiLCJpYXQiOjE3NDE5NTQ3OTAzNTl9.9kbd2DovwJqSKqh3OiSn3hj_2ZKyGTvmh47sNI00YpE/=
XvBI/pP27AQ/AQ/c96db320-aaec-4826-b730-8356d9114511/2/byY2mlONtt" rel=3D"no=
opener noreferrer nofollow"><span style=3D"color: rgb(0, 0, 0); font-size: =
12px; color: rgb(0, 0, 0)">Manage All Subscription or Add/Update Email</spa=
n></a></p></div>
=20
</td>
</tr><tr>
<td align=3D"left" style=3D"font-size:0px;padding:10px =
25px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;=
word-break:break-word;">
=20
<div style=3D"font-family:Ubuntu, Helvetica, Arial, sans-serif;font-s=
ize:13px;line-height:1;text-align:left;color:#000000;"><div style=3D"displa=
y:none; visibility:hidden; opacity:0; height:0; width:0; overflow:hidden;">
<p style=3D"margin:0px"><span style=3D"font-family: arial">=E2=80=8C&*N=
ote: If you're seeing this message, you are viewing our emails in a plain-t=
ext format. This format, while straightforward, may not showcase the comple=
te email experience of content we've prepared for you. In the HTML version,=
our emails may be enriched with clearer images to provide context, functio=
nal links for additional information, interactive elements for user engagem=
ent, and an organized layout designed for ease of reading. HTML emails are =
crafted for adaptability. Regardless of the device you use - a computer, a =
tablet, or a mobile phone - the content adjusts to ensure clarity and ease =
of navigation. This approach is all about ensuring a comfortable reading ex=
perience, irrespective of screen size. We recognize the varied reasons one =
might choose plain-text. It might be for simplicity, due to specific securi=
ty considerations, bandwidth constraints, or even because some devices or t=
ools present content this way by default, perhaps to increase user accessib=
ility. We respect each of these decisions and the reasons behind them. Your=
interaction with our content, in any format, is appreciated. We value your=
time and the trust you place in our communications. Thank you for being an=
active member of our community, and we look forward to continued exchanges=
in the future. If you have missed our previous HTML emails explaining what=
MailGenius does, here is an explanation: What Are SPF, DKIM, and DMARC? Im=
agine a world where your domain is protected from phishing, spam, and hacki=
ng attempts. That's precisely what SPF, DKIM, and DMARC can do for you! The=
se email authentication methods are stored as DNS TXT records, and they wor=
k together to ensure that unauthorized email sending, spoofing, and phishin=
g attacks are thwarted. Once these methods are implemented, domain owners c=
an enhance the security of their email infrastructures, protect their reput=
ation, and boost deliverability for higher response rates. You might wonder=
about the functioning of these methods. Interestingly, each one plays a un=
ique role in the email authentication process. * SPF focuses on IP addresse=
s authorized to send emails on behalf of a domain * DKIM deals with digital=
signatures added to email headers * DMARC synchronizes SPF and DKIM mechan=
isms while defining email handling policies and providing reporting on emai=
l authentication results We'll now delve into the specifics of these method=
s. Sender Policy Framework (SPF) The Sender Policy Framework (SPF) serves a=
s the initial defense in our email authentication toolkit, helping to keep =
your inbox free from messages that might end up in the spam folder. SPF is =
a DNS record that specifies the sender addresses authorized to send emails =
on behalf of a domain. You might question its importance. The answer lies i=
n the fact that a domain's SPF record, by specifying which IP addresses can=
send emails from your domain, prevents email spoofing and assists in verif=
ying the sender's identity via DNS records. You might wonder if it's possib=
le to have more than one SPF record for a single domain. The answer is no -=
only one SPF record is allowed per domain. So, if you're using Google Apps=
, for instance, you would need to include Google in your domain's SPF recor=
d to authorize it to send emails on your behalf. DomainKeys Identified Mail=
(DKIM) Following SPF is DomainKeys Identified Mail (DKIM), advancing email=
authentication to the next level. DKIM is a digital signature that utilize=
s public key cryptography to authenticate emails by adding it to the email =
headers. This means that each email sent from your domain will have a uniqu=
e digital signature, ensuring that messages are not sent without authorizat=
ion or impersonated. So how do you set up DKIM for your domain? It involves=
three main steps: generating a DKIM key, creating a DKIM TXT record, and e=
nabling DKIM signing. Once you've successfully configured DKIM, your outgoi=
ng emails will be signed with a digital signature, making it harder for att=
ackers to impersonate your domain and send phishing emails. Domain-based Me=
ssage Authentication, Reporting & Conformance (DMARC) Finally, we have Doma=
in-based Message Authentication, Reporting & Conformance. DMARC is a protoc=
ol that assists in avoiding phishing attacks and preserving brand reputatio=
n by synchronizing SPF and DKIM mechanisms, specifying email handling polic=
ies, and providing reporting on email authentication results. In simple ter=
ms, DMARC is like a security guard, ensuring that both SPF and DKIM are wor=
king together to protect your domain from email threats. DMARC policies pro=
vide instructions to mail servers regarding the handling of emails that fai=
l SPF or DKIM (or both), which can include quarantining, rejecting, or deli=
vering them. By implementing DMARC, you're not only enhancing your email se=
curity but also gaining valuable insights through DMARC reports, which prov=
ide administrators with the data necessary to modify their DMARC policies a=
ccordingly. We have a tool to check DMARC records to ensure you are properl=
y configured. Setting up SPF Records Having introduced the basics of SPF, D=
KIM, and DMARC, we can now move on to the setup of your SPF records. This p=
rocess involves checking for existing SPF records, creating new ones, and u=
pdating them as needed. By following these steps, you'll ensure that your d=
omain's IP addresses are authorized to send emails, reducing the chances of=
your messages being marked as spam or rejected by the recipient's mail ser=
ver. Before we proceed further, bear in mind that SPF records are stored as=
DNS TXT records. With no further ado, let's commence the steps to set up y=
our SPF records, from identifying existing ones to creating new ones or mod=
ifying them as required. Checking Existing SPF Record Let's first check if =
an SPF record has already been set up for the domain. If not, we can procee=
d with the process. To do this, you can use our SPF tester tool. If you fin=
d an existing SPF record, consult with your IT and/or provider before makin=
g any changes, as deleting the existing record may affect other tools you'r=
e using. Instead, consider adding more providers to your existing SPF if ne=
eded. In case you don't have an SPF record yet, it's time to create one. Le=
t's see how you can do that in the next section. Creating a New SPF Record =
To create a new SPF record, follow these steps: 1. Ensure that you adhere t=
o the proper syntax and include all authorized IP addresses. 2. For instanc=
e, if you're using Google Apps for email transmission, you should include G=
oogle in your SPF record. 3. After specifying the domain name, IP addresses=
, and syntax, you'll need to add the SPF record to your domain's DNS settin=
gs. Keep in mind that creating a new SPF record is not a one-time process. =
As your domain's authorized IP addresses change or new email providers are =
added, you'll need to update your SPF record accordingly. Let's discuss thi=
s in the next section. Updating Your SPF Record Updating your SPF record is=
essential to maintain accurate email authentication. To do this, you'll ne=
ed to modify the domain name, IP address, and SPF record syntax in your dom=
ain's DNS settings. For example, if you've started using a new email provid=
er or your domain's IP addresses have changed, you'll need to update your S=
PF record to reflect these changes. Remember to regularly review and update=
your SPF record to ensure it's correctly configured and free of errors. Yo=
u can use an SPF record checker tool or manually review the record for any =
inconsistencies. Configuring DKIM for Your Domain Once your SPF record has =
been set up, the next step is to configure DKIM for your domain. As mention=
ed earlier, configuring DKIM involves generating a key, creating a DKIM TXT=
record, and enabling DKIM signing. By setting up DKIM correctly, you'll p=
rovide an additional layer of email authentication, making it even more cha=
llenging for attackers to impersonate your domain and send phishing emails.=
Let's explore each of these steps in more detail, starting with generating=
a DKIM key. Generating a DKIM Key To generate a DKIM key, you can use your=
email provider's tools or third-party services. These tools will help you =
create a public/private key pair for DKIM signing. Once you've generated th=
e key, you'll need to publish the public key as a TXT record in your domain=
's DNS settings. Keep the private key secure, as it will be used by your em=
ail provider to sign outgoing emails with the DKIM signature. Creating a DK=
IM TXT Record Now that you have your DKIM key, it's time to create a DKIM T=
XT record in your domain's dns txt record settings. This involves adding a =
TXT record and specifying the DKIM key as the value. You can have multiple =
records for DKIM. The process may vary depending on your email service prov=
ider, so be sure to follow their instructions for creating a DKIM TXT recor=
d. Remember that DKIM is only as secure as the private key used to sign ema=
ils. Ensure that your private key is kept safe and secure to protect your d=
omain from potential security breaches. You can check your DKIM records wit=
h our tool. Enabling DKIM Signing With your DKIM TXT record in place, it's =
time to enable DKIM signing in your email provider's settings. This will en=
sure that all outgoing emails from your domain are signed with the generate=
d DKIM key, making it more difficult for attackers to spoof your domain and=
send phishing emails. Enabling DKIM signing is a crucial step in enhancing=
your domain's email security. By doing so, you'll not only protect your do=
main from unauthorized email sending but also improve the deliverability an=
d response rates of your emails. Implementing DMARC for Enhanced Email Secu=
rity Well done on setting up SPF and configuring DKIM for your domain! Your=
next task is implementing DMARC to boost email security. DMARC works by al=
igning SPF and DKIM mechanisms, defining email handling policies, and provi=
ding reporting on email authentication results. Implementing DMARC involves=
understanding policies, creating a TXT record, and monitoring reports. Let=
's begin by discussing DMARC policies and their significance. Understanding=
DMARC Policies DMARC policies are rules that determine how email receivers=
should handle incoming emails. There are three DMARC policy options: 1. No=
ne: This option instructs receivers to accept all emails, regardless of the=
ir authentication status. 2. Quarantine: This option instructs receivers to=
quarantine emails that fail authentication, meaning they may be delivered =
to the recipient's spam or junk folder. 3. Reject: This option instructs re=
ceivers to reject emails that fail authentication, meaning they will not be=
delivered to the recipient's inbox. Setting a DMARC policy helps to protec=
t organizations from email spoofing and phishing attacks. It is essential t=
o comprehend the process of transitioning between 'none', 'quarantine', and=
'reject' within DMARC policies. By implementing the right policy for your =
domain, you can effectively maintain email security and protect your organi=
zation from potential threats. Creating a DMARC TXT Record To create a DMAR=
C TXT record, you'll need to specify your desired policy and reporting opti=
ons in your domain's DNS settings. This will tell email receivers how to ha=
ndle emails that fail SPF or DKIM (or both) authentication. By creating a D=
MARC TXT record, you're not only enhancing your email security but also gai=
ning valuable insights through DMARC reports. These reports provide adminis=
trators with the data necessary to modify their DMARC policies accordingly =
and detect unauthorized senders pretending to be from your domain. Monitori=
ng DMARC Reports Monitoring DMARC reports is crucial for analyzing email au=
thentication results and identifying potential issues or threats. You can r=
eview the reports sent to the email addresses indicated in your DMARC recor=
d to gain valuable insights into email activity and detect any anomalies, s=
uch as a sudden surge in emails dispatched from your domain or a large quan=
tity of emails being transmitted from an IP address that is not affiliated =
with your domain. By regularly monitoring DMARC reports, you can stay infor=
med about your domain's email authentication performance and make necessary=
adjustments to your DMARC policies to maintain optimal email security. Tro=
ubleshooting Common SPF, DKIM, and DMARC Issues While implementing SPF, DKI=
M, and DMARC, you might come across some frequent issues that could affect =
your email security and deliverability. In this section, we'll discuss comm=
on SPF, DKIM, and DMARC issues and their solutions, including record errors=
, signature problems, and policy conflicts. By addressing these issues and =
ensuring that your SPF, DKIM, and DMARC records are correctly configured, y=
ou'll be well-equipped to protect your domain from email threats and mainta=
in a secure email infrastructure. SPF Record Errors SPF record errors may a=
rise when the SPF record for a domain is not correctly set up. This can res=
ult in emails being identified as spam or declined by the recipient's email=
server. To resolve SPF record errors, you'll need to identify the errors i=
n the SPF record and make the necessary modifications. This may involve add=
ing or removing IP addresses, revising the syntax, or carrying out other al=
terations as needed. Regularly review and update your SPF record to ensure =
it's correctly configured and free of errors. You can use an SPF record che=
cker tool or manually review the record for any inconsistencies. DKIM Signa=
ture Issues DKIM Signature errors arise when the signature for an email is =
not appropriately configured. This can result in emails being identified as=
spam or rejected by the recipient's email server. To troubleshoot DKIM sig=
nature issues, first, check the DKIM signature in the email header to ensur=
e validity. If it is not valid, then review the DKIM key and TXT record to =
confirm that they have been configured correctly. Keep your DKIM keys secur=
e and update them regularly to prevent potential security breaches and main=
tain your domain's email authentication integrity. DMARC Policy Conflicts D=
MARC policy conflicts can arise when the DMARC policy for a domain is not c=
orrectly configured, potentially resulting in emails being flagged as spam =
or rejected by the recipient's email server. To resolve DMARC policy confli=
cts, you can follow these steps: 1. Verify and check SPF, DKIM, and DMARC p=
olicies in detail. 2. Deploy DMARC in monitoring mode (p=3Dnone) and check =
DMARC fail error messages. 3. Utilize DMARC record lookup tools to validate=
and test DMARC records. By following these steps, you can ensure that your=
DMARC policy is correctly configured and avoid any conflicts as a domain o=
wner. By addressing DMARC policy conflicts and ensuring that your DMARC pol=
icies are correctly configured, you'll be well-equipped to protect your dom=
ain from email threats and maintain a secure email infrastructure. Summary =
Implementing SPF, DKIM, and DMARC records is crucial for enhancing your dom=
ain's email security and protecting it from unauthorized email sending, spo=
ofing, and phishing attacks. By following the steps outlined in this blog p=
ost and regularly reviewing and updating your records, you'll be well on yo=
ur way to maintaining a secure email infrastructure, safeguarding your repu=
tation, and improving deliverability and response rates. So go ahead, forti=
fy your email defenses, and enjoy the peace of mind that comes with a secur=
e domain!Email marketing is a lot like fishing. You can cast a shiny lure i=
nto the water, but you=E2=80=99re wasting time, energy, and resources if it=
misses the water and lands in the weeds. Here=E2=80=99s the harsh truth: a=
ll the clever copywriting, subject lines, and beautiful designs in the worl=
d mean nothing if you don=E2=80=99t know what actually affects email delive=
rability.
If it were as easy as changing your subject line, everyone would be in the =
primary inbox!
This isn=E2=80=99t about being creative=E2=80=94it=E2=80=99s about being st=
rategic. If your emails land in spam folders, your audience never sees your=
offers, your sales plummet, and you=E2=80=99re left wondering why your mar=
keting =E2=80=9Cisn=E2=80=99t working.=E2=80=9D
Spoiler alert: the problem isn=E2=80=99t your list or your product=E2=80=94=
it=E2=80=99s your deliverability.
Let=E2=80=99s get serious about email deliverability. Because when your ema=
ils consistently hit the inbox, you don=E2=80=99t just grow your business=E2=
=80=94you dominate your market.
Email Deliverability Expert Advice for Hitting the Inbox
(rawpixel.com/Freepik)
Table of Contents
What is Email Deliverability, Really?
Step 1: Building an Iron-Clad Sender Reputation
Authenticate Your Domain
Remove =E2=80=98Bad=E2=80=99 Subscribers
Maximize Engagement
Avoid Spam Triggers
Step 2: Writing Emails That Demand Attention (And Deliverability)
Step 3: Monitor, Adapt, and Conquer
Track Everything
Handle Spam Complaints Like a Pro
Check Your Sender Score
Use a Return Path
What Else Can I Do?
What Happens When You Get It Right
What is Email Deliverability, Really?
Email deliverability isn=E2=80=99t as simple as =E2=80=9CDid it send?=E2=80=
=9D It=E2=80=99s about where your email ends up:
The Inbox: The holy grail. This is where conversions happen.
Promotions or Spam: The junk drawer of email marketing. Good luck getting n=
oticed here.
The Void: Emails that bounce back or disappear into the ether.
Your deliverability rate measures how many emails were delivered to your re=
cipients=E2=80=99 email address (without bouncing back to you). But here=E2=
=80=99s the kicker: even if an email =E2=80=9Cdelivers,=E2=80=9D that doesn=
=E2=80=99t mean it hit the inbox! That=E2=80=99s why you need to focus on i=
nbox placement=E2=80=94getting your emails where they belong.
The deciding factor? Your sender reputation. This is your email =E2=80=9Ccr=
edit score,=E2=80=9D determined by how email service providers (ESPs) like =
Gmail or Outlook view your behavior. Screw this up, and your emails get blo=
cked faster than a telemarketer during dinner.
Step 1: Building an Iron-Clad Sender Reputation
Your sender reputation is your ticket to the inbox=E2=80=94or the blacklist=
. And yes, it=E2=80=99s something you can control. Here=E2=80=99s how to ke=
ep it squeaky clean:
Authenticate Your Domain
Without authentication protocols like SPF, DKIM, and DMARC=E2=80=94ESPs tre=
at your emails like sketchy Craigslist ads. These protocols prove you=E2=80=
=99re the real deal, not a scammer.
Remove =E2=80=98Bad=E2=80=99 Subscribers
Scrub your list regularly. Remove inactive, duplicate, or fake addresses. I=
f they haven=E2=80=99t opened an email in months, they=E2=80=99re dead weig=
ht. Use list scrubbing tools like Emailable1 to determine which of the emai=
l addresses on your list are valid and which ones will bounce back. The few=
er emails that bounce, the more trust your domain will gain. Double opt-ins=
can also help ensure new subscribers actually want to hear from you.
Maximize Engagement
ISPs like Google, Yahoo, and Outlook love high engagement rates. That means=
more opens, more clicks, and fewer unsubscribes or complaints. Write email=
s people can=E2=80=99t ignore. Period.
Avoid Spam Triggers
Words like =E2=80=9CAct Now!=E2=80=9D or =E2=80=9CBuy Today!=E2=80=9D, espe=
cially in the subject line, can flag your emails. Use them sparingly=E2=80=94=
and always balance them with authenticity.
Step 2: Writing Emails That Demand Attention (And Deliverability)
Your emails need to look and read like they belong in the inbox. Anything l=
ess is a one-way ticket to the spam folder.
Be Personal: Use the recipient=E2=80=99s name. Reference their past purchas=
es or interests. Generic emails scream =E2=80=9Cspam=E2=80=9D because Googl=
e analyzes every email sent to their recipients. If you say the same things=
as millions of other senders who are sent to spam each day, you will be tr=
eated like spam, too.
Keep It Balanced: A good email has a healthy ratio of text to images. Overl=
oad it with flashy graphics, and you=E2=80=99ll trip spam triggers.
Add Professional Polish: Typos, grammar mistakes, and excessive caps lock m=
ake you look unprofessional=E2=80=94and untrustworthy.
Test, Don=E2=80=99t Guess: Use A/B testing to refine your subject lines, co=
ntent, and design. It=E2=80=99s the only way to know what resonates with yo=
ur audience.
Step 3: Monitor, Adapt, and Conquer
Email deliverability isn=E2=80=99t a =E2=80=9Cset it and forget it=E2=80=9D=
process. It=E2=80=99s an ongoing battle, and your secret weapon is data.
Track Everything
Open rates, click-through rates, bounce rates=E2=80=94watch them like a haw=
k. A sudden drop is your warning sign.
Handle Spam Complaints Like a Pro
If you=E2=80=99re getting flagged, find out why. Review your content, scrub=
your list, and get back in the game.
Check Your Sender Score
Think of this as your deliverability report card. An email campaign checker=
can give you a sender score, showing an instant snapshot of how ESPs view =
your domain. The score runs from 0 to 100, and if you=E2=80=99re not hittin=
g at least 90, your emails are skating on thin ice.
Use a Return Path
This hidden email header lets you track bounces and see why your emails did=
n=E2=80=99t go through. Knowledge is power=E2=80=94and it=E2=80=99s the key=
to fixing problems before they spiral.
What Else Can I Do?
My advice? Use an email reputation monitoring tool to take control of your =
campaign today. If you=E2=80=99re not actively monitoring your sender reput=
ation, you=E2=80=99re flying blind. You wouldn=E2=80=99t run a business wit=
hout tracking your revenue or expenses, right? Your email reputation is jus=
t as critical=E2=80=94it=E2=80=99s the heartbeat of your email marketing ef=
forts.
Email deliverability is too important to leave to chance. A monitoring tool=
gives you invaluable insights into your domain=E2=80=99s performance, like=
spam rates and inbox placement. Think of it as your early warning system=E2=
=80=94spotting deliverability issues before they become catastrophic.
My Pro Tip: Set up alerts so you=E2=80=99re notified the moment your reputa=
tion starts slipping. Waiting for your open rates to plummet is the rookie =
move. Stay ahead by diagnosing and fixing problems before they spiral out o=
f control.
When you combine proactive monitoring with the strategies above, you=E2=80=99=
re no longer just =E2=80=9Csending emails=E2=80=9D=E2=80=94you=E2=80=99re c=
ommanding the inbox like the email marketing pro you are.
What Happens When You Get It Right
When you nail email deliverability, magic can happen:
Your messages land in front of your audience every time.
Your click-through rates skyrocket.
Your sales pipeline stays full.
But here=E2=80=99s the real kicker: your competitors won=E2=80=99t know wha=
t hit them. While they=E2=80=99re whining about low open rates and blaming =
algorithms, you=E2=80=99ll be cashing in with every email you send.</span><=
/p>
</div>
<div style=3D"text-align:center; color: #ccc; font-family: arial; font-size=
: 12px; padding: 1px;">
</div></div>
=20
</td>
</tr>
</tbody>
</table>
=20
</div>
=20
<!--[if mso | IE]></td></tr></table><![endif]-->
</td>
</tr>
</tbody>
</table>
=20
</div>
</div>
=20
=20
<!--[if mso | IE]></td></tr></table><![endif]-->
=20
=20
</td>
</tr>
</tbody>
</table>
</div>
=20
</div>
=20
=20
<p style=3D"text-align:center;margin:1em 0 3em;"><a href=3D"https://subsc=
riptions.pstmrk.it/unsubscribe?m=3D1.39hUvQn_MJ9FrZkmIonBaQ.MDNxSHusEhqIFzA=
M1dFsQJmzhl_RAE1ns5HIYYlxjMGhwmT3nm4l6ok6TYJVNdtVaqdAUFSblHNVD8HEngjvbcWA5f=
-4TudVXbgnI8AqKanL4M67hqgF3c2mbm4ftrnNVp948rCMt7-W3v8Mmo3S8QBcE9NX4CjISv8w4=
IkRN1EjCZZhW5PiZ1BLJ1nWz42QZKOoogdBOWFx1YaI_jEEEJ9ILy3DaMbsPh1JQkL1G3dqfAAj=
40Q9U2ZUXDLOOYjRM-qFqUiENq4eCMt4IXR3X_jK_yI5BP2qc0QK-rRlbbhc7gDuCfSyuwuOgwU=
RJvXiITJ2J26mQF91jbVjRsF84nb6c76Xk2r6-txZpKBYujToF2vwEfxY-p9zi0gq_IiJO61qod=
fL5PvUaupwMxRBgrOP-uMRZpM0Y02G8cSwiPNqTQe-ngQvLJM4RmXpQWTPODQtJV9_leJBvnokO=
jwSL_P2-6q2zIZIestfRQ1TDqo" style=3D"color:#A8AAAF;font-family:Helvetica,Ar=
ial,sans-serif;font-size:12px;">Unsubscribe</a></p><img src=3D"https://ea.p=
stmrk.it/open?m=3Dv3_1.tzLWnDNHlq06_LYwxpRHgw.gqIF3yay5r1nvE_W-g7a4-ADYnhIf=
KHQXJ05yWAzXBMRvVxYOb8xooLJNkXcosHAI21DHJ2kCuYl61bmFuMZq39EUENPCwA1G_B4Ag96=
djYkDFGjsrjLmB-Mbco8cI7Y9b3vPDYJj4SbL4ubcLDiSxABr_chyg7bqAIAtpZ4znMrtokvZtw=
hRmFe_4ltT7RxwMMt2RXnD3G_7ySrwJPOSAFzl4zcbKAmHjkxwpMlFVhiAdkghDhkTCU378SewV=
AN0P9cPb8l1z4u8RKE6S1BBQIkvGuxNqbOQsoyEm0Ad7r-Ku-vUIg4HqDuvXuEdW71zcRabD7UZ=
RrOEEp3eN6WaL_I9WefGtCLDjH-Di0qYVF0dI0PnFcFMVlTaUnceSCfGCnGkc2ZLdKNW-_8Z9V0=
TK2VOWwi1krRuN6KpcKIr0J627PCTDiBBSWP9h3vLSfSTRwc2voDLPG3LAph-fBEG1Tka6yWL1f=
eEjkE-p340Go" width=3D"1" height=3D"1" border=3D"0" alt=3D"" /></body></htm=
l><img src=3D"https://send-link.email/v1/smtp_email/event/opened/message/ey=
JhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJtZXNzYWdlSWQiOiI1SXRDSFNFZ00xYU81bG5i=
SWVFOSIsImhvc3QiOiJodHRwczovL3NlbmQtbGluay5lbWFpbCIsImlhdCI6MTc0MTk1NDc5MDM=
2MH0.tWGerIACQ4QekKiR5NWTu-70Bie9m6HIc4OFqpDy58g" height=3D"1px" width=3D"1=
px" alt=3D"" style=3D"display: none;" />